Week Objective
- Determine what data to analyze in a digital forensics investigation
- Explain tools used to validate data
- Explain common data-hiding techniques
Reading Unit
Chapter 9
Independent Lab
Chapter 9:Hand-on Project 9-1
Chapter 9: Hand-on Project 9-2:
Assignment
Case Project 9-2
Several graphics files were transmitted via e-mail from an unknown source to a suspect in an ongoing investigation. The lead investigator gives you these graphics file and tells you that at least four messages should be embedded in them. Use your problem solving skills and brainstorming skills to determine a procedure to follow. Write a short report outlining what to do.
Discussion Board
Based on the techniques discussed for hiding data on a computer, which method would you use for the following:
- Hiding information from a young family member who uses the same computer
- Hiding information from a colleague who is a network administrator
- Hiding information from an intelligence agency, such as the CIA
Discuss why the validation process is so important when criminal investigators obtain a computer as evidence in a crime.
Topics and Required Reading
- The importance of developmental validation In Forensic Science – https://blog.bizzmine.com/en/the-importance-of-developmental-validation-in-forensic-science
- AccessData Password Recovery Toolkit:
https://accessdata.com/products-services/forensic-toolkit-ftk
- National Software Reference Library:
- What a Hex Editor is and Why You Might Use It:
http://www.makeuseof.com/tag/hex-editor-technology-explained/
- Steganalysis: Detecting hidden information with computer forensic analysis
For more information about validation of digital forensics tools and technology: